SlideShare a Scribd company logo
© 2012 Cisco and/or its affiliates. All rights reserved. 1© 2010 Cisco and/or its affiliates. All rights reserved. 1
Wen-Pai Lu, Ph.D.
Cloud Security: A New Perspective
Technical Leader
CloudCon, 2014
Dalian, China
© 2012 Cisco and/or its affiliates. All rights reserved. 2
© 2012 Cisco and/or its affiliates. All rights reserved. 3
The Meaning of Cloud Quick recap
PublicPrivate HybridCommunity
Where?&&Deployment*Models*
Virtual
Private
What? Essential Characteristics (NIST)
Measured
Services
Rapid
Elasticity
Resource
Pooling
Self
Service Broad
Access
How?&Service*Models*
SaaS
PaaS
IaaS
© 2012 Cisco and/or its affiliates. All rights reserved. 4
Security is still the biggest obstacles to Cloud Adoption
#1 Security
policies
#2 Secure
Connectivity
#3 Changed
architecture
Integration
#4 QoS, SLAs,
WaaS, AVC, VPN
Forrester & Cisco report on Cloud market – 2013
© 2012 Cisco and/or its affiliates. All rights reserved. 5
It is all About
Data – Protecting
your Data is the
No. 1 Priority
© 2012 Cisco and/or its affiliates. All rights reserved. 6
Cloud Security is About …
© 2012 Cisco and/or its affiliates. All rights reserved. 7
Cloud Security: Defined
“In the Cloud”
Secure Cloud InfrastructurePrivate
Cloud
Virtualized
App Servers
In#the#Cloud:#Security)(products,)solu1ons))instan1ated)as)
an)opera1onal)capability)deployed)within)Cloud)
Compu1ng)environments.)Examples:))Routers,)Firewalls,)
IPS,)AV,)WAF,)…)
© 2012 Cisco and/or its affiliates. All rights reserved. 8
Cloud Security: Defined
“For the Cloud”
Secure Cloud Access
Public
Cloud
Secure Cloud Infrastructure
For$the$Cloud:$Security)services)that)are)specifically)
targeted)toward)securing)OTHER)Cloud)Compu=ng)
services,)delivered)by)Cloud)Compu=ng)providers.)
© 2012 Cisco and/or its affiliates. All rights reserved. 9
Cloud Security: Defined
“By the Cloud”
Secure Cloud Infrastructure
Cloud Security Services
Internet
Email
Web
Secure Mobility
By#the#Cloud:#Security)services)delivered)by)
Cloud)Compu3ng)services)which)are)used)by)
providers)
Securing Cloud Access
Secure Cloud Infrastructure
© 2012 Cisco and/or its affiliates. All rights reserved. 10
Infrastructure Security
Load
Balancer
SSL
Termination
Web App
Firewall
Firewall IDS/IPS
Public Cloud
(Hosted)
Enterprise Cloud
(Hosted)
SP
Broadband
Access
Access
Access
Virtualized Security in
Private Cloud:
•  vASA, ASAv
•  Nexus 1000v
•  VSG
•  TrustSec
Physical Security:
•  ASA
•  SourceFire
•  Trustsec
Secure bridging (#2)
•  Nexus 1000v InterCloud
VPC Isolation
•  Nexus 1000v InterCloud
Enabling virtualized Security in
Public Cloud (#1,#3):
•  Nexus 1000v InterCloud
•  VSG, ASA 1000v
•  Nexus 1000v
•  vASA
Enabling secure L3 access to
Cloud, WAN services (#2, #4)
•  CSR 1000v
© 2012 Cisco and/or its affiliates. All rights reserved. 11
•  More moving parts, ore
Complex,
•  Code Execution from VM Guest
to Host
•  Service Console Flaws
•  New Configuration Controls
•  Segmentation and Separation
•  Hypervisor Security
•  OS Security
•  Side Channel Attacks
•  Monitoring & Visibility
•  Virtual Security Products
© 2012 Cisco and/or its affiliates. All rights reserved. 12
Applications & Software
© 2012 Cisco and/or its affiliates. All rights reserved. 13
•  ISO 27001 Adherence
•  Power Supply
•  Cooling
•  Fire and Flood Damage
•  Facilities Access Right
•  Policy
•  Facility and Personnel
Monitoring
•  Physical Risk Assessments
•  Remediation Plan
•  Network Cable accessible in
public access area
© 2012 Cisco and/or its affiliates. All rights reserved. 14
© 2012 Cisco and/or its affiliates. All rights reserved. 15
•  Background Check
•  HR Hiring Policy
•  Security Awareness and Training
•  Ongoing data and system access
rights
© 2012 Cisco and/or its affiliates. All rights reserved. 16
•  Control Standards such as
SSAE 16 SOC 1 or SOC 2
•  PIC, HIPAA, FISMA, SOX, or
local standards
•  Baseline of Compliance Needs
•  “Boundaries” where Compliance
applies
•  Required Controls for
Compliance Mandates, like
GRC, CCM, etc.
•  Responsible Parties
•  Legal Impacts and
Ramifications
© 2012 Cisco and/or its affiliates. All rights reserved. 17
•  What is your BCP and DR
plan?
•  Who is responsible?
•  Which part of your DATA
should be included in the
planning
•  Backup Strategy
•  RTO & RPO Objectives
•  DR Process
© 2012 Cisco and/or its affiliates. All rights reserved. 18
1.  Data Breaches
2.  Data Loss
3.  Account or Service Traffic Hijacking
4.  Insecure Interfaces and APIs
5.  Denial of Services
6.  Malicious Insiders
7.  Abuse Cloud Services
8.  Insufficient Due Diligence
9.  Share Technology Vulnerabilities https://downloads.cloudsecurityalliance.org/initiatives/top_threats/
The_Notorious_Nine_Cloud_Computing_Top_Threats_in_2013.pdf
© 2012 Cisco and/or its affiliates. All rights reserved. 19
Where is Your DATA?
© 2012 Cisco and/or its affiliates. All rights reserved. 20
Cloud Security is all About….
•  Confidentiality
•  Integrity
•  Available
•  Compliance
•  Governance
•  Risk Management
© 2012 Cisco and/or its affiliates. All rights reserved. 21
•  Shift of Telco Business
moves toward Application
Centric
•  Business is Measured by $
per Services
•  Network Services move
from Appliance Centric to
Software-based
•  Cloud becomes Key
Enable in their New
Business Model
Voice Centric
Frame
Relay
ISDN
ATM
QAM
T1,
DS3
PSTN
SMDS
X.25
$ per Call
Data Centric
VOIP
L2/L3 VPNs
VOD
Streaming
Video
Triple
Play
Cellular
Data
IPTV
SP Wi-Fi
$ per mbs
Hosted
Collaboration
Elastic Load
Balancing
Disaster
Recovery
Security
AAS
Bandwidth
On-Demand
Cloud
Storage
Application
Centric
$ per Service
Wave of Business
© 2012 Cisco and/or its affiliates. All rights reserved. 22
Orchestra)on/Management	&	API	per	vService	
Security As A Service & Threat Defense
Elastic Security Services Architecture
Internet
L2 VPN
L3 VPN
Ubiquitous Ethernet
Access Node
Satellite, EoMPLS,
MPLS-TP, etc Private Cloud
Residential
Customer
Remote POP
A9K Cluster
Managed
Router
vWAAS
Security
DPI
vASA
vWSA
SBC
3rd
Party
Hypervisor*
UCS**and/or*On*Box*Compute*Resources*
OS* OS* OS* OS* OS*
IronPort
Service insertion/chaining
UCS*or*VSM/Forge*
vASA
vWSA
SBC
Scansafe
SBC
Controller
© 2012 Cisco and/or its affiliates. All rights reserved. 23
New Cloud Service Offering by “CSP”
Software Define Network (SDN) Network Function Virtualization (NFV)
Business'Applica-ons'Business'Applica-ons'Business'Applica-ons'
Business'Applica-ons'
Business'Applica-ons'
Network'Services'
Network'
Services'
Control''
Layer'
Applica-on'Layer'
NFV'Orchestra-on'and'Management'
Compute' Network' Storage'
Hardware'Resources'
Virtualiza-on'Layer'
Virtual'
Compute'
Virtual'
Network'
Virtual'
Storage'
NFV'Infrastructure'(NFVI)'
VNF'
VNF'VNF'
VNF' VNF'
VNF'
VNF'
API' API'
API'
Infrastructure'
Layer'
OSS/BSS'
© 2012 Cisco and/or its affiliates. All rights reserved. 24
•  Application API vulnerability
•  Service Hijacking
•  Virtualization Attacks
•  Distribution Denial of Attacks
•  Hardware and Software Hardening
•  Malicious Insiders
•  Insufficient Due Diligence
•  Share Technology Vulnerabilities
•  Segmentation and Isolation
•  Identity of Devices, Users, Roles
and Location
•  Traffic Sniffing
•  Unified Cloud Access Security
•  Threat Visibility
•  Dynamic Security Enforcement
•  Security Ecosystem
•  And much more …
© 2012 Cisco and/or its affiliates. All rights reserved. 25
From Enterprises (End Users)
•  Information Security – Security of Data and
Services
•  Data Life Cycle – Generation, Use, Transfer,
Transformation, Storage, Archive and Destruction
•  IT Service Continuity – Business Continuity and
Disaster Recovery
•  Incident Management – how soon CSP can restore
services, and Intrusion Detection
•  Change Management – Standardize methods and
procedures for efficient of all changes
•  Data Loss and Breaches
•  Infrastructure Security – Network, Compute,
Storage, Access Control, etc.
•  Compliances and Standards
From Service Providers
•  Service Asset – for maintain information about
Configuration Items (CI) required to deliver
Cloud Services
•  Configuration Management
•  Demand Management – prepare for such
demands
•  Capacity Management – Availability of
sufficient capacity
•  Request Fulfillment – process for fulfilling
service request
•  Branding and Publicity
•  Service Availability – lose of Revenue and
Trust
•  Management and Operations
© 2012 Cisco and/or its affiliates. All rights reserved. 26
•  Cloud Security is not only about Data Protection
•  Data Protection includes both Data At Rest and Data In Transit
•  Need to Implement Data Life Cycle with CSP
•  Infrastructure Security provides required Protection for your Data in the Cloud
•  Need to do your due Diligent – Cloud Risk Analysis and Security Assessment
•  Other “Hard” Security Considerations include Identity and Access Management, Physical
Facilities Security, DR and BDP, and Intrusion Detection and Incident Responses
•  “Soft” Security Considerations include Compliances and Legal Considerations, Audit for
the Cloud, Policy, Contracts with CSP, and Governance
•  DO YOUR HOME WORK to know what YOU are Getting
© 2012 Cisco and/or its affiliates. All rights reserved. 27
Thank you.Thank you.
© 2012 Cisco and/or its affiliates. All rights reserved. 28
Backup
Cloud Security: A New Perspective
Ad

More Related Content

What's hot (20)

cloud security ppt
cloud security ppt cloud security ppt
cloud security ppt
Devyani Vaidya
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
AWS User Group Bengaluru
 
Cloud Security Tutorial | Cloud Security Fundamentals | AWS Training | Edureka
Cloud Security Tutorial | Cloud Security Fundamentals | AWS Training | EdurekaCloud Security Tutorial | Cloud Security Fundamentals | AWS Training | Edureka
Cloud Security Tutorial | Cloud Security Fundamentals | AWS Training | Edureka
Edureka!
 
Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)
Cloudflare
 
Azure Security Overview
Azure Security OverviewAzure Security Overview
Azure Security Overview
David J Rosenthal
 
Cloud Security Architecture.pptx
Cloud Security Architecture.pptxCloud Security Architecture.pptx
Cloud Security Architecture.pptx
Moshe Ferber
 
Microsoft Defender and Azure Sentinel
Microsoft Defender and Azure SentinelMicrosoft Defender and Azure Sentinel
Microsoft Defender and Azure Sentinel
David J Rosenthal
 
Cloud security
Cloud securityCloud security
Cloud security
Tushar Kayande
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
AWS User Group Bengaluru
 
Cloud Security Strategy
Cloud Security StrategyCloud Security Strategy
Cloud Security Strategy
Capgemini
 
Microsoft Zero Trust
Microsoft Zero TrustMicrosoft Zero Trust
Microsoft Zero Trust
David J Rosenthal
 
Security architecture
Security architectureSecurity architecture
Security architecture
Duncan Unwin
 
Cloud Privacy & Security compliance
Cloud Privacy & Security complianceCloud Privacy & Security compliance
Cloud Privacy & Security compliance
Bryan Starbuck
 
SIEM Primer:
SIEM Primer:SIEM Primer:
SIEM Primer:
Anton Chuvakin
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
Ahmad Haghighi
 
Cloud Security And Privacy
Cloud Security And PrivacyCloud Security And Privacy
Cloud Security And Privacy
tmather
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
Michael Nickle
 
Cloud security
Cloud securityCloud security
Cloud security
BikashPokharel3
 
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to Success
Sirius
 
Key Challenges In CLOUD COMPUTING
Key Challenges In CLOUD COMPUTINGKey Challenges In CLOUD COMPUTING
Key Challenges In CLOUD COMPUTING
Atul Chounde
 
Cloud Security Tutorial | Cloud Security Fundamentals | AWS Training | Edureka
Cloud Security Tutorial | Cloud Security Fundamentals | AWS Training | EdurekaCloud Security Tutorial | Cloud Security Fundamentals | AWS Training | Edureka
Cloud Security Tutorial | Cloud Security Fundamentals | AWS Training | Edureka
Edureka!
 
Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)
Cloudflare
 
Cloud Security Architecture.pptx
Cloud Security Architecture.pptxCloud Security Architecture.pptx
Cloud Security Architecture.pptx
Moshe Ferber
 
Microsoft Defender and Azure Sentinel
Microsoft Defender and Azure SentinelMicrosoft Defender and Azure Sentinel
Microsoft Defender and Azure Sentinel
David J Rosenthal
 
Cloud Security Strategy
Cloud Security StrategyCloud Security Strategy
Cloud Security Strategy
Capgemini
 
Security architecture
Security architectureSecurity architecture
Security architecture
Duncan Unwin
 
Cloud Privacy & Security compliance
Cloud Privacy & Security complianceCloud Privacy & Security compliance
Cloud Privacy & Security compliance
Bryan Starbuck
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
Ahmad Haghighi
 
Cloud Security And Privacy
Cloud Security And PrivacyCloud Security And Privacy
Cloud Security And Privacy
tmather
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
Michael Nickle
 
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to Success
Sirius
 
Key Challenges In CLOUD COMPUTING
Key Challenges In CLOUD COMPUTINGKey Challenges In CLOUD COMPUTING
Key Challenges In CLOUD COMPUTING
Atul Chounde
 

Viewers also liked (17)

Обнаружение уязвимостей логики приложений методом статического анализа. Где п...
Обнаружение уязвимостей логики приложений методом статического анализа. Где п...Обнаружение уязвимостей логики приложений методом статического анализа. Где п...
Обнаружение уязвимостей логики приложений методом статического анализа. Где п...
Andrew Petukhov
 
Flashtennis semanario 2 enero 2017
Flashtennis semanario 2 enero 2017Flashtennis semanario 2 enero 2017
Flashtennis semanario 2 enero 2017
Edgar Gonzalez Allegre
 
Achievement at PT MGMS Lampung
Achievement at PT MGMS LampungAchievement at PT MGMS Lampung
Achievement at PT MGMS Lampung
Edward Prasetyo
 
Work Of Concept at Bancassurance
Work Of Concept at BancassuranceWork Of Concept at Bancassurance
Work Of Concept at Bancassurance
Edward Prasetyo
 
MVA Presentation 3
MVA Presentation 3MVA Presentation 3
MVA Presentation 3
Bryan Chung
 
Chapter 10.3.4
Chapter 10.3.4Chapter 10.3.4
Chapter 10.3.4
mrbruns
 
Baromètre e-commerce des petites entreprises par PriceMinister et LaPoste ave...
Baromètre e-commerce des petites entreprises par PriceMinister et LaPoste ave...Baromètre e-commerce des petites entreprises par PriceMinister et LaPoste ave...
Baromètre e-commerce des petites entreprises par PriceMinister et LaPoste ave...
PriceMinister
 
Carrier-grade-virtual-platform-use-case
Carrier-grade-virtual-platform-use-caseCarrier-grade-virtual-platform-use-case
Carrier-grade-virtual-platform-use-case
Sheryl Zhang
 
Flashtennis semanario 14 noviembre 2016
Flashtennis semanario 14 noviembre 2016Flashtennis semanario 14 noviembre 2016
Flashtennis semanario 14 noviembre 2016
Edgar Gonzalez Allegre
 
Distribuire una libreria Java per usarla come dipendenza gradle
Distribuire una libreria Java per usarla come dipendenza gradleDistribuire una libreria Java per usarla come dipendenza gradle
Distribuire una libreria Java per usarla come dipendenza gradle
Paolo Montalto
 
WWI
WWIWWI
WWI
mrbruns
 
Extended Context/Extended Media - Class 02
Extended Context/Extended Media - Class 02Extended Context/Extended Media - Class 02
Extended Context/Extended Media - Class 02
Bryan Chung
 
Kinetic Typography
Kinetic TypographyKinetic Typography
Kinetic Typography
Bryan Chung
 
Микола Вороний “Ущухла буря”
Микола Вороний “Ущухла буря” Микола Вороний “Ущухла буря”
Микола Вороний “Ущухла буря”
Swjatoslaw Matwijchuk
 
Contact Management - Schmooze
Contact Management - SchmoozeContact Management - Schmooze
Contact Management - Schmooze
Mathew Lawrence
 
E.g.o
E.g.oE.g.o
E.g.o
Ivon Tellez
 
Обнаружение уязвимостей логики приложений методом статического анализа. Где п...
Обнаружение уязвимостей логики приложений методом статического анализа. Где п...Обнаружение уязвимостей логики приложений методом статического анализа. Где п...
Обнаружение уязвимостей логики приложений методом статического анализа. Где п...
Andrew Petukhov
 
Achievement at PT MGMS Lampung
Achievement at PT MGMS LampungAchievement at PT MGMS Lampung
Achievement at PT MGMS Lampung
Edward Prasetyo
 
Work Of Concept at Bancassurance
Work Of Concept at BancassuranceWork Of Concept at Bancassurance
Work Of Concept at Bancassurance
Edward Prasetyo
 
MVA Presentation 3
MVA Presentation 3MVA Presentation 3
MVA Presentation 3
Bryan Chung
 
Chapter 10.3.4
Chapter 10.3.4Chapter 10.3.4
Chapter 10.3.4
mrbruns
 
Baromètre e-commerce des petites entreprises par PriceMinister et LaPoste ave...
Baromètre e-commerce des petites entreprises par PriceMinister et LaPoste ave...Baromètre e-commerce des petites entreprises par PriceMinister et LaPoste ave...
Baromètre e-commerce des petites entreprises par PriceMinister et LaPoste ave...
PriceMinister
 
Carrier-grade-virtual-platform-use-case
Carrier-grade-virtual-platform-use-caseCarrier-grade-virtual-platform-use-case
Carrier-grade-virtual-platform-use-case
Sheryl Zhang
 
Flashtennis semanario 14 noviembre 2016
Flashtennis semanario 14 noviembre 2016Flashtennis semanario 14 noviembre 2016
Flashtennis semanario 14 noviembre 2016
Edgar Gonzalez Allegre
 
Distribuire una libreria Java per usarla come dipendenza gradle
Distribuire una libreria Java per usarla come dipendenza gradleDistribuire una libreria Java per usarla come dipendenza gradle
Distribuire una libreria Java per usarla come dipendenza gradle
Paolo Montalto
 
Extended Context/Extended Media - Class 02
Extended Context/Extended Media - Class 02Extended Context/Extended Media - Class 02
Extended Context/Extended Media - Class 02
Bryan Chung
 
Kinetic Typography
Kinetic TypographyKinetic Typography
Kinetic Typography
Bryan Chung
 
Микола Вороний “Ущухла буря”
Микола Вороний “Ущухла буря” Микола Вороний “Ущухла буря”
Микола Вороний “Ущухла буря”
Swjatoslaw Matwijchuk
 
Contact Management - Schmooze
Contact Management - SchmoozeContact Management - Schmooze
Contact Management - Schmooze
Mathew Lawrence
 
Ad

Similar to Cloud Security: A New Perspective (20)

Stefan Haase Cloud
Stefan Haase CloudStefan Haase Cloud
Stefan Haase Cloud
Tracey Johnson
 
The Changing Data Center Landscape
The Changing Data Center LandscapeThe Changing Data Center Landscape
The Changing Data Center Landscape
Cisco Canada
 
Sam Herath - Six Critical Criteria for Cloud Workload Security
Sam Herath - Six Critical Criteria for Cloud Workload SecuritySam Herath - Six Critical Criteria for Cloud Workload Security
Sam Herath - Six Critical Criteria for Cloud Workload Security
centralohioissa
 
Developing a cloud strategy - Presentation Nexon ABC Event
Developing a cloud strategy - Presentation Nexon ABC EventDeveloping a cloud strategy - Presentation Nexon ABC Event
Developing a cloud strategy - Presentation Nexon ABC Event
Nexon Asia Pacific
 
Primend Praktiline Konverents - Rakenduse keskne IT infrastruktuur / Cisco Ap...
Primend Praktiline Konverents - Rakenduse keskne IT infrastruktuur / Cisco Ap...Primend Praktiline Konverents - Rakenduse keskne IT infrastruktuur / Cisco Ap...
Primend Praktiline Konverents - Rakenduse keskne IT infrastruktuur / Cisco Ap...
Primend
 
Presentation ciac
Presentation   ciacPresentation   ciac
Presentation ciac
xKinAnx
 
Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...
Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...
Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...
Miriade Spa
 
Transforming cloud security into an advantage
Transforming cloud security into an advantageTransforming cloud security into an advantage
Transforming cloud security into an advantage
Moshe Ferber
 
Security that works with, not against, your SaaS business
Security that works with, not against, your SaaS businessSecurity that works with, not against, your SaaS business
Security that works with, not against, your SaaS business
CloudPassage
 
Securing Data in the Cloud - GISEC2017
Securing Data in the Cloud - GISEC2017Securing Data in the Cloud - GISEC2017
Securing Data in the Cloud - GISEC2017
Sohaib Mahmood
 
5787355.ppt
5787355.ppt5787355.ppt
5787355.ppt
ahmad21315
 
Gitex journey to the cloud
Gitex journey to the cloudGitex journey to the cloud
Gitex journey to the cloud
Jorge Sebastiao
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
UnifyCloud
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Norm Barber
 
Citrix Synergy 2014 - Syn231 Why cloud projects fail
Citrix Synergy 2014 - Syn231 Why cloud projects failCitrix Synergy 2014 - Syn231 Why cloud projects fail
Citrix Synergy 2014 - Syn231 Why cloud projects fail
Citrix
 
CISCO’s Cloud Journey (Keynote at Cloud Symposium)
CISCO’s Cloud Journey (Keynote at Cloud Symposium) CISCO’s Cloud Journey (Keynote at Cloud Symposium)
CISCO’s Cloud Journey (Keynote at Cloud Symposium)
Marcus McEwen
 
Datacenter 2014: Symantec - Peter Schjøtt
Datacenter 2014: Symantec - Peter SchjøttDatacenter 2014: Symantec - Peter Schjøtt
Datacenter 2014: Symantec - Peter Schjøtt
Mediehuset Ingeniøren Live
 
Cisco UCS Director for the Public Sector
Cisco UCS Director for the Public SectorCisco UCS Director for the Public Sector
Cisco UCS Director for the Public Sector
Amy Blanchard
 
F5 Synthesis Toronto February 2014 Roadshow
F5 Synthesis Toronto February 2014 RoadshowF5 Synthesis Toronto February 2014 Roadshow
F5 Synthesis Toronto February 2014 Roadshow
patmisasi
 
Cisco Powered: Your Trusted Source for Cloud and Managed Services
Cisco Powered: Your Trusted Source for Cloud and Managed ServicesCisco Powered: Your Trusted Source for Cloud and Managed Services
Cisco Powered: Your Trusted Source for Cloud and Managed Services
Cisco Canada
 
The Changing Data Center Landscape
The Changing Data Center LandscapeThe Changing Data Center Landscape
The Changing Data Center Landscape
Cisco Canada
 
Sam Herath - Six Critical Criteria for Cloud Workload Security
Sam Herath - Six Critical Criteria for Cloud Workload SecuritySam Herath - Six Critical Criteria for Cloud Workload Security
Sam Herath - Six Critical Criteria for Cloud Workload Security
centralohioissa
 
Developing a cloud strategy - Presentation Nexon ABC Event
Developing a cloud strategy - Presentation Nexon ABC EventDeveloping a cloud strategy - Presentation Nexon ABC Event
Developing a cloud strategy - Presentation Nexon ABC Event
Nexon Asia Pacific
 
Primend Praktiline Konverents - Rakenduse keskne IT infrastruktuur / Cisco Ap...
Primend Praktiline Konverents - Rakenduse keskne IT infrastruktuur / Cisco Ap...Primend Praktiline Konverents - Rakenduse keskne IT infrastruktuur / Cisco Ap...
Primend Praktiline Konverents - Rakenduse keskne IT infrastruktuur / Cisco Ap...
Primend
 
Presentation ciac
Presentation   ciacPresentation   ciac
Presentation ciac
xKinAnx
 
Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...
Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...
Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...
Miriade Spa
 
Transforming cloud security into an advantage
Transforming cloud security into an advantageTransforming cloud security into an advantage
Transforming cloud security into an advantage
Moshe Ferber
 
Security that works with, not against, your SaaS business
Security that works with, not against, your SaaS businessSecurity that works with, not against, your SaaS business
Security that works with, not against, your SaaS business
CloudPassage
 
Securing Data in the Cloud - GISEC2017
Securing Data in the Cloud - GISEC2017Securing Data in the Cloud - GISEC2017
Securing Data in the Cloud - GISEC2017
Sohaib Mahmood
 
Gitex journey to the cloud
Gitex journey to the cloudGitex journey to the cloud
Gitex journey to the cloud
Jorge Sebastiao
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
UnifyCloud
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Norm Barber
 
Citrix Synergy 2014 - Syn231 Why cloud projects fail
Citrix Synergy 2014 - Syn231 Why cloud projects failCitrix Synergy 2014 - Syn231 Why cloud projects fail
Citrix Synergy 2014 - Syn231 Why cloud projects fail
Citrix
 
CISCO’s Cloud Journey (Keynote at Cloud Symposium)
CISCO’s Cloud Journey (Keynote at Cloud Symposium) CISCO’s Cloud Journey (Keynote at Cloud Symposium)
CISCO’s Cloud Journey (Keynote at Cloud Symposium)
Marcus McEwen
 
Cisco UCS Director for the Public Sector
Cisco UCS Director for the Public SectorCisco UCS Director for the Public Sector
Cisco UCS Director for the Public Sector
Amy Blanchard
 
F5 Synthesis Toronto February 2014 Roadshow
F5 Synthesis Toronto February 2014 RoadshowF5 Synthesis Toronto February 2014 Roadshow
F5 Synthesis Toronto February 2014 Roadshow
patmisasi
 
Cisco Powered: Your Trusted Source for Cloud and Managed Services
Cisco Powered: Your Trusted Source for Cloud and Managed ServicesCisco Powered: Your Trusted Source for Cloud and Managed Services
Cisco Powered: Your Trusted Source for Cloud and Managed Services
Cisco Canada
 
Ad

Recently uploaded (20)

Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)
Ortus Solutions, Corp
 
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
Alan Dix
 
Quantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur MorganQuantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur Morgan
Arthur Morgan
 
Generative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in BusinessGenerative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in Business
Dr. Tathagat Varma
 
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdfComplete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Software Company
 
Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025
Splunk
 
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes
 
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdfSAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
Precisely
 
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded DevelopersLinux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Toradex
 
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Impelsys Inc.
 
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptxSpecial Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
shyamraj55
 
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager APIUiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPathCommunity
 
Drupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy ConsumptionDrupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy Consumption
Exove
 
Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
 
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
BookNet Canada
 
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc
 
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptxDevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
Justin Reock
 
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfThe Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
Abi john
 
Role of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered ManufacturingRole of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered Manufacturing
Andrew Leo
 
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptxIncreasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Anoop Ashok
 
Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)
Ortus Solutions, Corp
 
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
Alan Dix
 
Quantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur MorganQuantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur Morgan
Arthur Morgan
 
Generative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in BusinessGenerative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in Business
Dr. Tathagat Varma
 
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdfComplete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Software Company
 
Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025
Splunk
 
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes
 
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdfSAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
Precisely
 
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded DevelopersLinux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Toradex
 
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Impelsys Inc.
 
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptxSpecial Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
shyamraj55
 
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager APIUiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPathCommunity
 
Drupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy ConsumptionDrupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy Consumption
Exove
 
Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
 
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
BookNet Canada
 
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc
 
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptxDevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
Justin Reock
 
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfThe Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
Abi john
 
Role of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered ManufacturingRole of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered Manufacturing
Andrew Leo
 
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptxIncreasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Anoop Ashok
 

Cloud Security: A New Perspective

  • 1. © 2012 Cisco and/or its affiliates. All rights reserved. 1© 2010 Cisco and/or its affiliates. All rights reserved. 1 Wen-Pai Lu, Ph.D. Cloud Security: A New Perspective Technical Leader CloudCon, 2014 Dalian, China
  • 2. © 2012 Cisco and/or its affiliates. All rights reserved. 2
  • 3. © 2012 Cisco and/or its affiliates. All rights reserved. 3 The Meaning of Cloud Quick recap PublicPrivate HybridCommunity Where?&&Deployment*Models* Virtual Private What? Essential Characteristics (NIST) Measured Services Rapid Elasticity Resource Pooling Self Service Broad Access How?&Service*Models* SaaS PaaS IaaS
  • 4. © 2012 Cisco and/or its affiliates. All rights reserved. 4 Security is still the biggest obstacles to Cloud Adoption #1 Security policies #2 Secure Connectivity #3 Changed architecture Integration #4 QoS, SLAs, WaaS, AVC, VPN Forrester & Cisco report on Cloud market – 2013
  • 5. © 2012 Cisco and/or its affiliates. All rights reserved. 5 It is all About Data – Protecting your Data is the No. 1 Priority
  • 6. © 2012 Cisco and/or its affiliates. All rights reserved. 6 Cloud Security is About …
  • 7. © 2012 Cisco and/or its affiliates. All rights reserved. 7 Cloud Security: Defined “In the Cloud” Secure Cloud InfrastructurePrivate Cloud Virtualized App Servers In#the#Cloud:#Security)(products,)solu1ons))instan1ated)as) an)opera1onal)capability)deployed)within)Cloud) Compu1ng)environments.)Examples:))Routers,)Firewalls,) IPS,)AV,)WAF,)…)
  • 8. © 2012 Cisco and/or its affiliates. All rights reserved. 8 Cloud Security: Defined “For the Cloud” Secure Cloud Access Public Cloud Secure Cloud Infrastructure For$the$Cloud:$Security)services)that)are)specifically) targeted)toward)securing)OTHER)Cloud)Compu=ng) services,)delivered)by)Cloud)Compu=ng)providers.)
  • 9. © 2012 Cisco and/or its affiliates. All rights reserved. 9 Cloud Security: Defined “By the Cloud” Secure Cloud Infrastructure Cloud Security Services Internet Email Web Secure Mobility By#the#Cloud:#Security)services)delivered)by) Cloud)Compu3ng)services)which)are)used)by) providers) Securing Cloud Access Secure Cloud Infrastructure
  • 10. © 2012 Cisco and/or its affiliates. All rights reserved. 10 Infrastructure Security Load Balancer SSL Termination Web App Firewall Firewall IDS/IPS Public Cloud (Hosted) Enterprise Cloud (Hosted) SP Broadband Access Access Access Virtualized Security in Private Cloud: •  vASA, ASAv •  Nexus 1000v •  VSG •  TrustSec Physical Security: •  ASA •  SourceFire •  Trustsec Secure bridging (#2) •  Nexus 1000v InterCloud VPC Isolation •  Nexus 1000v InterCloud Enabling virtualized Security in Public Cloud (#1,#3): •  Nexus 1000v InterCloud •  VSG, ASA 1000v •  Nexus 1000v •  vASA Enabling secure L3 access to Cloud, WAN services (#2, #4) •  CSR 1000v
  • 11. © 2012 Cisco and/or its affiliates. All rights reserved. 11 •  More moving parts, ore Complex, •  Code Execution from VM Guest to Host •  Service Console Flaws •  New Configuration Controls •  Segmentation and Separation •  Hypervisor Security •  OS Security •  Side Channel Attacks •  Monitoring & Visibility •  Virtual Security Products
  • 12. © 2012 Cisco and/or its affiliates. All rights reserved. 12 Applications & Software
  • 13. © 2012 Cisco and/or its affiliates. All rights reserved. 13 •  ISO 27001 Adherence •  Power Supply •  Cooling •  Fire and Flood Damage •  Facilities Access Right •  Policy •  Facility and Personnel Monitoring •  Physical Risk Assessments •  Remediation Plan •  Network Cable accessible in public access area
  • 14. © 2012 Cisco and/or its affiliates. All rights reserved. 14
  • 15. © 2012 Cisco and/or its affiliates. All rights reserved. 15 •  Background Check •  HR Hiring Policy •  Security Awareness and Training •  Ongoing data and system access rights
  • 16. © 2012 Cisco and/or its affiliates. All rights reserved. 16 •  Control Standards such as SSAE 16 SOC 1 or SOC 2 •  PIC, HIPAA, FISMA, SOX, or local standards •  Baseline of Compliance Needs •  “Boundaries” where Compliance applies •  Required Controls for Compliance Mandates, like GRC, CCM, etc. •  Responsible Parties •  Legal Impacts and Ramifications
  • 17. © 2012 Cisco and/or its affiliates. All rights reserved. 17 •  What is your BCP and DR plan? •  Who is responsible? •  Which part of your DATA should be included in the planning •  Backup Strategy •  RTO & RPO Objectives •  DR Process
  • 18. © 2012 Cisco and/or its affiliates. All rights reserved. 18 1.  Data Breaches 2.  Data Loss 3.  Account or Service Traffic Hijacking 4.  Insecure Interfaces and APIs 5.  Denial of Services 6.  Malicious Insiders 7.  Abuse Cloud Services 8.  Insufficient Due Diligence 9.  Share Technology Vulnerabilities https://downloads.cloudsecurityalliance.org/initiatives/top_threats/ The_Notorious_Nine_Cloud_Computing_Top_Threats_in_2013.pdf
  • 19. © 2012 Cisco and/or its affiliates. All rights reserved. 19 Where is Your DATA?
  • 20. © 2012 Cisco and/or its affiliates. All rights reserved. 20 Cloud Security is all About…. •  Confidentiality •  Integrity •  Available •  Compliance •  Governance •  Risk Management
  • 21. © 2012 Cisco and/or its affiliates. All rights reserved. 21 •  Shift of Telco Business moves toward Application Centric •  Business is Measured by $ per Services •  Network Services move from Appliance Centric to Software-based •  Cloud becomes Key Enable in their New Business Model Voice Centric Frame Relay ISDN ATM QAM T1, DS3 PSTN SMDS X.25 $ per Call Data Centric VOIP L2/L3 VPNs VOD Streaming Video Triple Play Cellular Data IPTV SP Wi-Fi $ per mbs Hosted Collaboration Elastic Load Balancing Disaster Recovery Security AAS Bandwidth On-Demand Cloud Storage Application Centric $ per Service Wave of Business
  • 22. © 2012 Cisco and/or its affiliates. All rights reserved. 22 Orchestra)on/Management & API per vService Security As A Service & Threat Defense Elastic Security Services Architecture Internet L2 VPN L3 VPN Ubiquitous Ethernet Access Node Satellite, EoMPLS, MPLS-TP, etc Private Cloud Residential Customer Remote POP A9K Cluster Managed Router vWAAS Security DPI vASA vWSA SBC 3rd Party Hypervisor* UCS**and/or*On*Box*Compute*Resources* OS* OS* OS* OS* OS* IronPort Service insertion/chaining UCS*or*VSM/Forge* vASA vWSA SBC Scansafe SBC Controller
  • 23. © 2012 Cisco and/or its affiliates. All rights reserved. 23 New Cloud Service Offering by “CSP” Software Define Network (SDN) Network Function Virtualization (NFV) Business'Applica-ons'Business'Applica-ons'Business'Applica-ons' Business'Applica-ons' Business'Applica-ons' Network'Services' Network' Services' Control'' Layer' Applica-on'Layer' NFV'Orchestra-on'and'Management' Compute' Network' Storage' Hardware'Resources' Virtualiza-on'Layer' Virtual' Compute' Virtual' Network' Virtual' Storage' NFV'Infrastructure'(NFVI)' VNF' VNF'VNF' VNF' VNF' VNF' VNF' API' API' API' Infrastructure' Layer' OSS/BSS'
  • 24. © 2012 Cisco and/or its affiliates. All rights reserved. 24 •  Application API vulnerability •  Service Hijacking •  Virtualization Attacks •  Distribution Denial of Attacks •  Hardware and Software Hardening •  Malicious Insiders •  Insufficient Due Diligence •  Share Technology Vulnerabilities •  Segmentation and Isolation •  Identity of Devices, Users, Roles and Location •  Traffic Sniffing •  Unified Cloud Access Security •  Threat Visibility •  Dynamic Security Enforcement •  Security Ecosystem •  And much more …
  • 25. © 2012 Cisco and/or its affiliates. All rights reserved. 25 From Enterprises (End Users) •  Information Security – Security of Data and Services •  Data Life Cycle – Generation, Use, Transfer, Transformation, Storage, Archive and Destruction •  IT Service Continuity – Business Continuity and Disaster Recovery •  Incident Management – how soon CSP can restore services, and Intrusion Detection •  Change Management – Standardize methods and procedures for efficient of all changes •  Data Loss and Breaches •  Infrastructure Security – Network, Compute, Storage, Access Control, etc. •  Compliances and Standards From Service Providers •  Service Asset – for maintain information about Configuration Items (CI) required to deliver Cloud Services •  Configuration Management •  Demand Management – prepare for such demands •  Capacity Management – Availability of sufficient capacity •  Request Fulfillment – process for fulfilling service request •  Branding and Publicity •  Service Availability – lose of Revenue and Trust •  Management and Operations
  • 26. © 2012 Cisco and/or its affiliates. All rights reserved. 26 •  Cloud Security is not only about Data Protection •  Data Protection includes both Data At Rest and Data In Transit •  Need to Implement Data Life Cycle with CSP •  Infrastructure Security provides required Protection for your Data in the Cloud •  Need to do your due Diligent – Cloud Risk Analysis and Security Assessment •  Other “Hard” Security Considerations include Identity and Access Management, Physical Facilities Security, DR and BDP, and Intrusion Detection and Incident Responses •  “Soft” Security Considerations include Compliances and Legal Considerations, Audit for the Cloud, Policy, Contracts with CSP, and Governance •  DO YOUR HOME WORK to know what YOU are Getting
  • 27. © 2012 Cisco and/or its affiliates. All rights reserved. 27 Thank you.Thank you.
  • 28. © 2012 Cisco and/or its affiliates. All rights reserved. 28 Backup